Академический Документы
Профессиональный Документы
Культура Документы
Term Report
MOBILE
COMMERCE
TABLE OF CONTENTS
01. INTRODUCTION 5
02. IMPORTANCE OF E-COMMERCE 6
03. LATEST TRENDS & COMSUMER
REACTION 7
04. HARDWARE 9
05. SOFTWARE 10
06. NETWORK 10
07. ADVANTAGES 11
08. DISADVANTAGES 11
09. NETWORK TECHNOLOGIES 12
10. LEGACY LIMITATIONS 15
11. POTENTIAL RISK 15
Dear Sir,
With all due respect I am thankful to you for giving us a worth-while opportunity
to have the new experience which is not only fruitful in my present but also will
help me in future because of its practical nature and application.
Enclosed find herewith a term report on M-commerce. This report is prepared on
estimating “Importance, limitations & Potential risk of M-commerce”. In order to
make this report reliable, authentic and near to the facts, I tried our level best to
get as much information as I can.
Yours truly,
_________________________________________
M. Faisal Panawala
GR # 2200649
ACKNOWLEDGEMENT
First of all I am grateful to Almighty Allah, for his blessings that enabled me to
understand and undertake the opportunity for completing this report with the right
approach and sense of direction.
I would also like to thank all the friends, colleagues and concerned persons who
helped me in the preparation of this report.
Special thanks go to all those who contributed in the formation of this report in
order to make it they tried their level best and in collected as much information as
they can.
1. Introduction
M-commerce is the market of buying and selling goods with wireless technology
such as PDA’s and cellular phones primarily
within the retail, telecommunications and
financial services industries. Many phone
companies are enabling services for M-commerce
applications and marketing their products to
organizations who can utilize M commerce.
Wireless technology has brought its benefits to
M-Commerce and its challenges as well.
M-commerce can have easy portable access to the web with web-based
applications, but very slow data transfer speeds. Keypads of phones are sometimes
difficult to use especially when there is a need to enter text. Many companies use
the one button approach to make transactions easy when the data is on file. With
little graphics on the screen of most cell phones, buying this way requires prior
knowledge of transaction needs and M-Commerce techniques. The use of mobile
technology is primarily used for email and messaging as well as weather alerts and
reminders.
Though ecommerce has grown as expected, M-Commerce has not taken off the
same way for the use of goods and services. Wireless services are not everywhere
and consumers often do not feel safe or happy buying with their phone. As
technology increases this may change. As for now Consumer’s use M-commerce
as a portable friend to communicate and to do transactions. When consumers feel
secure, they buy. As the younger generation grows with wireless business models
will further develop M-Commerce.
The latest trends of e-commerce include electronic bill pay, digital signatures,
online banking just to name a few. Electronic bill pay is essentially paying your
household bills over the internet. In most cases, it works
like this. The consumer subscribes to an EBP provider,
deposits funds (or you allow them access to your bank
account) with them and as the consumer receives their
bills in the mail, they in turn email them to their EBP
provider with the date that they want the invoices paid.
What can go wrong? Plenty Consumers have registered
complaints with the Federal Trade Commission stating
that the EBP providers were not paying their bills in time. Therefore, consumers
were assessed late charges and damaging credit ratings. This service has
improved since it was first offered a few years ago. The security has increased
and the government now keeps a closer eye on this type of business.
Online banking is the banking industry to compete with on another and with the
electronic bill pay providers. Online banking allows consumers to check their
balances, pay bills, purchase certificate of deposits and apply for loans all from the
consumers’ home. This is a wonderful service that the
banking industry has offered. The draw back for consumers
is with servers crashing and hackers downloading your
banking information. Whereas, the banking industry has
taken extreme measures to ensure the consumers privacy no
system is hacker proof. Consumers can protect themselves
by not downloading their banking information at the same
time (they need to do it at varying times) according to banking experts.
From the advantages and the disadvantages, the economic weight to the latest
trend e-commerce is no longer an emerging force. E-Commerce is a force that has
a strong presence not only in the Untied States but internationally as well.
4. Hardware:
Mobile computing device - be it, a notebook, hand-
held computer, pen computer, PDA, PalmOS
compatible PDA, Symbian EPOC handheld device,
Windows CE/Pocket PC device, or a modern
smart phone with Wireless Internet connectivity
A suitably-configured wire line or wireless WAN
modem, wireless LAN adapter, or a flash card
either as a distinctly separate accessory or embedded on the device - as is the trend
now.
A Web Server with wireless support, WAP gateway, a Communications Server
and/or MCSS (Mobile communications server switch) or a wireless gateway
embedded in wireless carrier's network - this server provides communications
functionality to allow the handheld device to communicate with the Internet or
Intranet infrastructure. An application or database server (the hardware piece) with
application logic and business application database - tier 2 server
Optionally, a large enterprise application server (tier3) in the form of a UNIX
super server, IBM’s AS/400 server or IBM's OS/390 mainframe.
5. Software:
Mobile client OS-type software that resides in the mobile device - it may be
Windows98/2000/NT, PalmOS, Win CE (or Pocket PC), EPOC, a specialized OS
like Blackberry, or a Web browser
Mobile application user interface with application logic in a handheld PDA, smart
phone, Palm or a Wintel notebook. In the Internet world, it is often under the
control of a browser or micro browser.
Wireless middleware that links multiple wireless
networks to application servers. Data synchronization
software that synchronizes data in the mobile device with
the network server or the backend server
Mobile Device management software like: XcelleNet's Afaria, Synchrologic
Mobile suite or Mobile Automation's MA2000. Finally, the most useful software -
end user application like messaging, sales force automation, public query, data
collection, etc.
6. Network
A wireless network - this may be either a private network that police agencies and
emergency health services use or a public shared network
that is provided by network providers, such as Cingular
(formerly Bell South Wireless Data), Verizon, Sprint
PCS, Nextel, Bell Mobility (Canada) , Roger's AT&T
(Canada), Vodafone in Europe, BT in UK, NTT
DoCoMo (Japan), etc.
While wireless network provides true mobility, you may utilize a wire line
network for those mobile users who need occasion connection from hotels, motels
or airport lounges of airline's regular patrons. Some of these airports are now
offering wireless LAN connectivity to wire line backend networks.
7. Advantages of M-commerce
• Ubiquity: the end user device is mobile, that is the user can access
applications in real time at any place.
• Security: depending on specific end user device, the device offers a certain
level of inherent security. For example SIM card employed in mobile stores
confidential user information such as secret authentication key.
• Localization: a network operator can localize registered users by using
positioning systems, such as GPS, GSM or UMTS network technology.
• Convenience: the size and weight of mobile device and their ubiquity and
accessibility makes them an ideal tool for performing personal tasks.
• Personalization: mobile devices are not usually shared between users.
Mobile operator can offer personalized services to its users.
8. Disadvantages of M-commerce
GSM
Global System for Mobile Communication (GSM) is the current European
standard for mobile communications. GSM handsets are popular and widespread,
they have to be considered as the major device for mobile commerce at the
moment. The data services provided are
• SMS (short message service) allows the exchange of 160 character short
messages over the signaling channel.
UMTS
Universal Mobile
Telecommunication System) is
the next generation (3G) mobile
telecommunication system and a
further development of GSM. In
general, the security architecture
of UMTS is carefully designed to
fix the security weakness of
GSM. Crucially, 3G/UMTS has
been specified as an integrated
solution for mobile voice and data
with wide area coverage.
Universally standardized via the Third Generation Partnership Project
(www.3gpp.org) and using globally harmonized spectrum in paired and unpaired
bands, 3G/UMTS in its initial phase offers theoretical bit rates of up to 384 kbps in
high mobility situations, rising as high as 2 Mbps in stationary/nomadic user
environments. Symmetry between uplink and downlink data rates when using
paired (FDD) spectrum also means that 3G/UMTS is ideally suited for
applications such as real-time video telephony - in contrast with other technologies
WLAN
The IEEE standard 802.11 specifies families of wireless local area networks
(WLAN) which operate in the unlicensed 2.4 GHz and 5 GHz band.
Bluetooth
Bluetooth is a wireless technology developed by the
Bluetooth Special Interest group and is mainly aiming at
ad hoc Pico nets and connections to peripheral devices.
Bluetooth technology will probably often be used in the
future to connect devices in the personal environment
which makes it relevant for M-commerce.
goods and the terms and conditions of sale may be provided. Spam may increase.
And marketing may be targeted at children and other vulnerable consumers, who
may not have the capacity or authority to make purchases
2. Lack of security of financial information: There are concerns about the
security of consumers’ financial information. Information could be intercepted in
transmission or obtained surreptiously
3. Unauthorized purchases: Unless there is a PIN or some other form of
authentication required, it is easy to use someone else’s mobile without their
consent
4. Problems obtaining redress: When things go wrong, it may be hard for
consumers to prove the details of transactions, if the purchase details are not
recorded (for example, on mobile phone bills)
5. Illegal activities: Mobile phones, like other forms of technology, can be
misused if consumers access illegal content (such as child pornography); and
6. Privacy and discrimination: Vendors may collect information about what
consumers buy and where they go, and use it for unauthorized purposes, including
sharing it (without consent) with others. This may, for instance, lead to more
intrusive marketing.
The information collected could also be used to identify the most profitable
consumers to offer them the best deals, leaving the less profitable consumers
increasingly excluded from markets.